Chapter 3 Flashcards
Megan runs the following Nmap scan:
nmap -sU -sT -p 1-65535 example.com
What information will she not receive?
A. TCP services
B. The state of the service
C. UDP services
D. A list of vulnerable services
D. A list of vulnerable services
Tom wants to find metadata about an organization using a search engine.
What tool from the
following list should he use?
A. ExifTool
B. MetaSearch
C. FOCA
D. Nmap
C. FOCA (Fingerprinting Organizations with Collected Archives)
ExifTool is for individual files
After running an Nmap scan of a system, Zarmeena discovers that TCP ports 139, 443, and
3389 are open. What operating system is she most likely to discover running on the system?
A. Windows
B. Android
C. Linux
D. iOS
A. Windows
Charles runs an Nmap scan using the following command:
nmap -sT -sV -T2 -p 1-65535 example.com
After watching the scan run for over two hours, he realizes that he needs to optimize the
scan. Which of the following is not a useful way to speed up his scan?
A. Only scan via UDP to improve speed.
B. Change the scan timing to 3 or faster.
C. Change to a SYN scan.
D. Use the default port list
A. Only scan via UDP to improve speed.
Karen identifies TCP ports 8080 and 8443 open on a remote system during a port scan.
What tool is her best option to manually validate the services running on these ports?
A. SSH
B. SFTP
C. Telnet
D. A web browser
D. A web browser
(Admins shift servicers from common ports to different ones, she can use a browser to check)
Angela recovered a PNG image during the early intelligence-gathering phase of a penetration
test and wants to examine it for useful metadata.
What tool could she most successfully use
to do this?
A. ExifTool
B. Grep
C. PsTools
D. Nginx
A. ExifTool
During an Nmap scan, Casey uses the -O flag. The scan identifies the host as follows:
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.33
What can she determine from this information?
D. That the system is running a Linux 2.6 kernel between .9 and .33
What is the full range of ports that a UDP service can run on?
A. 1–1024
B. 1–16,383
C. 1–32,767
D. 1–65,535
D. 1–65,535
(for both TCP and UDP)
Steve is working from an unprivileged user account that was obtained as part of a penetration test. He has discovered that the host he is on has Nmap installed, and he wants to scan
other hosts in his subnet to identify potential targets as part of a pivot attempt.
What Nmap
flag will Steve probably have to use to successfully scan hosts from this account?
A. -sV
B. -u
C. -oA
D. -sT
D. -sT
(Used when an underprivileged account is the tester’s only option)
Which of the following provides information about a domain’s registrar and
physical location?
A. Nslookup
B. host
C. WHOIS
D. traceroute
C. WHOIS
Chris runs an Nmap scan of the 10.10.0.0/16 network that his employer uses as an internal
network range for the entire organization.
If he uses the -T0 flag, what issue is he likely to
encounter?
A. The scan will terminate when the host count reaches 0.
B. The scan will not scan IP addresses in the .0 network.
C. The scan will progress at a very slow speed.
D. The scan will only scan for TCP services.
C. The scan will progress at a very slow speed.
Which of the following Nmap output formats is unlikely to be useful for a penetration tester?
A. -oA
B. -oS
C. -oG
D. -oX
B. -oS
(this is a script kiddie output format, should never be used for a real pen test.
During an early phase of his penetration test, Mike recovers a binary executable file that he
wants to quickly analyze for useful information. Which of the following will quickly give him
a view of potentially useful information in the binary?
A. Netcat
B. strings
C. Hashmod
D. Eclipse
B. strings
(parses a file for strings of text and outputs them)
Jack is conducting a penetration test for a customer in Japan. What NIC will he most likely
have to check for information about his client’s networks?
A. RIPE
B. ARIN
C. APNIC
D. LACNIC
C. APNIC
(covers Asia-Pacific Asia, Australia, New Zealand) RESEARCH THE OTHERS AS WELL
Lin believes that the organization she is scanning may have load balancers in use.
Which of
the following techniques will help her detect them if they are DNS-based load balancers?
A. Use Nmap and look for service port differences.
B. Use ping and check for TTL and IP changes.
C. Use Nessus and check for service version differences.
D. Use WHOIS to check for multiple hostnames.
B. Use ping and check for TTL and IP changes.